default search action
Mike Just
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i10]Kahraman Kostas, Mike Just, Michael A. Lones:
IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection. CoRR abs/2401.01343 (2024) - [i9]Kahraman Kostas, Mike Just, Michael A. Lones:
Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion Detection. CoRR abs/2406.07578 (2024) - 2023
- [j11]Katie Watson, Mike Just, Tessa Berg:
A comic-based approach to permission request communication. Comput. Secur. 124: 102942 (2023) - [i8]Kahraman Kostas, Mike Just, Michael A. Lones:
Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset. CoRR abs/2307.08679 (2023) - 2022
- [j10]Lenka Dedkova, David Smahel, Mike Just:
Digital security in families: the sources of information relate to the active mediation of internet safety and parental internet skills. Behav. Inf. Technol. 41(5): 1052-1064 (2022) - [j9]Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just:
Context matters: Methods for Bitcoin tracking. Digit. Investig. 42-43: 301475 (2022) - [j8]Kahraman Kostas, Mike Just, Michael A. Lones:
IoTDevID: A Behavior-Based Device Identification Method for the IoT. IEEE Internet Things J. 9(23): 23741-23749 (2022) - [c30]Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just:
The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection. EICC 2022: 21-28 - [c29]Salih Ismail, Hani Ragab Hassen, Mike Just, Hind Zantout:
SI22: A dataset for analysis of DoS attack on the Cloud. UCC 2022: 372-377 - 2021
- [j7]Salih Ismail, Hani Ragab Hassen, Mike Just, Hind Zantout:
A review of amplification-based distributed denial of service attacks and their mitigation. Comput. Secur. 109: 102380 (2021) - [c28]Filip Wieslaw Bartoszewski, Mike Just, Michael A. Lones, Oleksii Mandrychenko:
Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles. SEC 2021: 367-381 - [i7]Kahraman Kostas, Mike Just, Michael A. Lones:
IoTDevID: A Behaviour-Based Fingerprinting Method for Device Identification in the IoT. CoRR abs/2102.08866 (2021) - 2020
- [c27]Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just:
Tracking Mixed Bitcoins. DPM/CBT@ESORICS 2020: 447-457 - [c26]Kirsty Macmillan, Tessa Berg, Mike Just, Mary Stewart:
Are autistic children more vulnerable online? Relating autism to online safety, child wellbeing and parental risk management. NordiCHI 2020: 14:1-14:11 - [c25]Katie Watson, Mike Just, Tessa Berg:
An Investigation of Comic-Based Permission Requests. NordSec 2020: 246-261 - [i6]Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just:
Tracking Mixed Bitcoins. CoRR abs/2009.14007 (2020)
2010 – 2019
- 2019
- [c24]Mike Just, Hasmeet Chandok, Raghav V. Sampangi, Kirstie Hawkey, Alette Willis, JeyaBalaji Samuthiravelu, Dilpreet Gill, Michael Altair:
Personal Safety App Effectiveness. CHI Extended Abstracts 2019 - [i5]Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just:
Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis. CoRR abs/1906.05754 (2019) - 2018
- [j6]Vlasta Stavova, Lenka Dedkova, Vashek Matyas, Mike Just, David Smahel, Martin Ukrop:
Experimental large-scale review of attractors for detection of potentially unwanted applications. Comput. Secur. 76: 92-100 (2018) - [j5]Ahmed Saeed, Ali Ahmadinia, Mike Just:
Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems. Comput. 7(2): 31 (2018) - 2017
- [c23]Graham A. Wilson, Harry Maxwell, Mike Just:
Everything's Cool: Extending Security Warnings with Thermal Feedback. CHI Extended Abstracts 2017: 2232-2239 - [c22]Mike Just, Tessa Berg:
Keeping Children Safe Online: Understanding the Concerns of Carers of Children with Autism. INTERACT (3) 2017: 34-53 - [c21]Nicholas Micallef, Mike Just, Lynne Baillie, Maher Alharby:
Stop annoying me!: an empirical investigation of the usability of app privacy notifications. OZCHI 2017: 371-375 - 2016
- [j4]Ahmed Saeed, Ali Ahmadinia, Mike Just:
Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation. Adv. Softw. Eng. 2016: 9842936:1-9842936:19 (2016) - [j3]Ahmed Saeed, Ali Ahmadinia, Mike Just:
Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems. J. Circuits Syst. Comput. 25(8): 1650089:1-1650089:28 (2016) - [c20]Muhammad Adnan, Mike Just, Lynne Baillie:
Investigating Time Series Visualisations to Improve the User Experience. CHI 2016: 5444-5455 - [c19]Ahmed Saeed, Ali Ahmadinia, Mike Just:
Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses. CS2@HiPEAC 2016: 31-36 - [c18]Vlasta Stavova, Vashek Matyas, Mike Just:
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. WISTP 2016: 35-50 - 2015
- [j2]Muhammad Adnan, Mike Just, Lynne Baillie, Hilmi Günes Kayacik:
Investigating the work practices of network security professionals. Inf. Comput. Secur. 23(3): 347-367 (2015) - [c17]Nicholas Micallef, Mike Just, Lynne Baillie, Martin Halvey, Hilmi Günes Kayacik:
Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking. MobileHCI 2015: 284-294 - [c16]Nicholas Micallef, Hilmi Günes Kayacik, Mike Just, Lynne Baillie, David Aspinall:
Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices. PerCom 2015: 189-197 - [i4]Abigail Goldsteen, Tyrone Grandison, Mike Just, Larry Koved, Rohan Malcolm, Sean S. E. Thorpe:
Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015. CoRR abs/1506.06791 (2015) - 2014
- [c15]Ahmed Saeed, Ali Ahmadinia, Mike Just, Christophe Bobda:
An ID and Address Protection Unit for NoC based Communication Architectures. SIN 2014: 288 - [i3]Larry Koved, Kapil Singh, Hao Chen, Mike Just:
Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014. CoRR abs/1410.6674 (2014) - [i2]Hilmi Günes Kayacik, Mike Just, Lynne Baillie, David Aspinall, Nicholas Micallef:
Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors. CoRR abs/1410.7743 (2014) - 2013
- [c14]Shamal Faily, Lizzie Coles-Kemp, Paul Dunphy, Mike Just, Yoko Akama, Alexander De Luca:
Designing interactive secure system: chi 2013 special interest group. CHI Extended Abstracts 2013: 2469-2472 - [c13]David Aspinall, Mike Just:
"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks. Financial Cryptography 2013: 126-143 - [c12]Nicholas Micallef, Mike Just, Lynne Baillie, Hilmi Günes Kayacik:
Stop questioning me!: towards optimizing user involvement during data collection on mobile devices. Mobile HCI 2013: 588-593 - [c11]Nicholas Micallef, Mike Just, Lynne Baillie, Hilmi Günes Kayacik:
Non-intrusive and Transparent Authentication on Smart Phones - (Extended Abstract). TRUST 2013: 271-272 - 2012
- [c10]Rod McCall, Lynne Baillie, Franziska Boehm, Mike Just:
Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming. ICEC 2012: 584-585 - [c9]Mike Just, David Aspinall:
On the security and usability of dual credential authentication in UK online banking. ICITST 2012: 259-264 - 2011
- [r14]Mike Just:
Challenge-Response Identification. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 198-199 - [r13]Mike Just:
Diffie-Hellman Key Agreement. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 341-342 - [r12]Mike Just:
Identity Management. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 586-587 - [r11]Mike Just:
Key Agreement. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 677-678 - [r10]Mike Just:
Key Escrow. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 681-682 - [r9]Mike Just:
Needham-Schroeder Protocols. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 829-831 - [r8]Mike Just:
Nonrepudiation of Digital Signatures. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 852-854 - [r7]Mike Just:
PKI Trust Models. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 936-939 - [r6]Mike Just:
Schnorr Identification Protocol. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1083 - 2010
- [c8]Karen Renaud, Mike Just:
Pictures or questions?: examining user responses to association-based authentication. BCS HCI 2010: 98-107 - [c7]Joseph Bonneau, Mike Just, Greg Matthews:
What's in a Name? Financial Cryptography 2010: 98-113
2000 – 2009
- 2009
- [c6]Mike Just, David Aspinall:
Personal choice and challenge questions: a security and usability assessment. SOUPS 2009 - 2005
- [r5]Mike Just:
Challenge-Response Identification. Encyclopedia of Cryptography and Security 2005 - [r4]Mike Just:
Diffie-Hellman Key Agreement. Encyclopedia of Cryptography and Security 2005 - [r3]Mike Just:
Key agreement. Encyclopedia of Cryptography and Security 2005 - [r2]Mike Just:
Needham-Schroeder Protocols. Encyclopedia of Cryptography and Security 2005 - [r1]Mike Just:
Schnorr Indentification Scheme. Encyclopedia of Cryptography and Security 2005 - 2004
- [j1]Mike Just:
Designing and Evaluating Challenge-Question Systems. IEEE Secur. Priv. 2(5): 32-39 (2004) - [i1]Dale Gustafson, Mike Just, Magnus Nyström:
Securely Available Credentials (SACRED) - Credential Server Framework. RFC 3760: 1-22 (2004) - 2003
- [c5]Mike Just, Evangelos Kranakis, Tao Wan:
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. ADHOC-NOW 2003: 151-163
1990 – 1999
- 1999
- [c4]Mike Just, Paul C. van Oorschot:
Addressing the Problem of Undetected Signature Key Compromise. NDSS 1999 - 1998
- [c3]Mike Just:
Some Timestamping Protocol Failures. NDSS 1998 - 1996
- [c2]Mike Just, Serge Vaudenay:
Authenticated Multi-Party Key Agreement. ASIACRYPT 1996: 36-49 - 1994
- [c1]Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot:
On Key Distribution via True Broadcasting. CCS 1994: 81-88
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint